Mandriva Linux Security Advisory 2014-160 - A heap-based buffer overflow in gpgme before 1.5.1 could allow a specially crafted certificate to cause crashes or potentially cause arbitrary code execution.
3a2632bb92e57a77a1c220ac77855a0de178391c091931127952d4759be91148
Debian Linux Security Advisory 3005-1 - Tomas Trnka discovered a heap-based buffer overflow within the gpgsm status handler of GPGME, a library designed to make access to GnuPG easier for applications. An attacker could use this issue to cause an application using GPGME to crash (denial of service) or possibly to execute arbitrary code.
87df4b9703f2842f1b062b2d784fd8523fc34d6925ec04297b57befecdaecbca
Ubuntu Security Notice 2307-1 - It was discovered that GPGME incorrectly handled certain certificate line lengths. An attacker could use this issue to cause applications using GPGME to crash, resulting in a denial of service, or possibly execute arbitrary code.
60fb41dd87963da28da51b4201d54af49504ba07635d0f484c0bb4ff9dc5bf53